DOI: 10.1007/978-3-540-70500-0_24
|View full text |Cite
|
Sign up to set email alerts
|

Related-Key Chosen IV Attacks on Grain-v1 and Grain-128

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(31 citation statements)
references
References 3 publications
0
31
0
Order By: Relevance
“…In [9] a sliding property was used to speed-up exhaustive search by a factor of two. Related-key attacks on the full cipher were presented in [10]. However, the relevance of related-key attacks is disputed, and in this paper we concentrate on attacks in the single key model.…”
Section: Previous Results On Grain-128mentioning
confidence: 99%
“…In [9] a sliding property was used to speed-up exhaustive search by a factor of two. Related-key attacks on the full cipher were presented in [10]. However, the relevance of related-key attacks is disputed, and in this paper we concentrate on attacks in the single key model.…”
Section: Previous Results On Grain-128mentioning
confidence: 99%
“…The above idea is at the basis of "slide resynchronization" attacks on the stream cipher Grain [16,28], which are related-key attacks using as relation a rotation of the key, to simulate a persistent shift between two internal states.…”
Section: Resistance To Slide Distinguishersmentioning
confidence: 99%
“…Our experiments indicate that these are dense, high-degree polynomials involving a large number of internal state bits. Thus, the number of cycles in the initialisation process seems to be sufficient for diffusing the bits of the initial state in a very complex way, and we believe that rakaposhi is secure against the most recent attacks on the initialisation process [10,25,32,35].…”
Section: Analysis Of the Initialisation Processmentioning
confidence: 99%